lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 7 Mar 2017 09:33:14 +0100 (CET) From: Thomas Gleixner <tglx@...utronix.de> To: Ingo Molnar <mingo@...nel.org> cc: kbuild test robot <fengguang.wu@...el.com>, Rik van Riel <riel@...hat.com>, kbuild-all@...org, LKML <linux-kernel@...r.kernel.org>, tipbuild@...or.com, "H. Peter Anvin" <hpa@...or.com>, x86@...nel.org, Dave Hansen <dave.hansen@...ux.intel.com>, Yu-cheng Yu <yu-cheng.yu@...el.com>, Fenghua Yu <fenghua.yu@...el.com>, Borislav Petkov <bp@...e.de>, Peter Zijlstra <peterz@...radead.org> Subject: Re: [PATCH] x86/fpu: fix boolreturn.cocci warnings On Tue, 7 Mar 2017, Ingo Molnar wrote: > > * kbuild test robot <fengguang.wu@...el.com> wrote: > > > arch/x86/kernel/fpu/xstate.c:931:9-10: WARNING: return of 0/1 in function 'xfeatures_mxcsr_quirk' with return type bool > > > > Return statements in functions returning bool should use > > true/false instead of 1/0. > > Note that this is a totally bogus warning. I personally find a 0/1 return more > readable than a textual 'true/false', even if bools are used, and nowhere does the > kernel mandate the use of 0/1. I disagree. The fact that booleans have been brought retroactively into the C-Standard does and for compability reasons C still follows the approach "Boolean values are just integers" does not make it any better. We had stupid bugs, where people returned -EINVAL from a boolean function and introduced silly and hard to understand bugs. The canonical values assigned to booleans are 'true' and 'false' and not whatever people prefer. Can we please be consistent on that? Thanks, tglx
Powered by blists - more mailing lists